Lookup for vulnerable packages by Package URL.
| Purl | pkg:alpm/archlinux/gitlab@13.11.3-1 |
| Type | alpm |
| Namespace | archlinux |
| Name | gitlab |
| Version | 13.11.3-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 13.12.2-1 |
| Latest_non_vulnerable_version | 15.2.1-1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-3gk7-f7rw-s3bt |
| vulnerability_id |
VCID-3gk7-f7rw-s3bt |
| summary |
An issue has been discovered in GitLab affecting all versions starting with 13.10. GitLab was vulnerable to a stored XSS in blob viewer of notebooks. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22220 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35278 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35418 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35618 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35643 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35525 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35571 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35595 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35605 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35561 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35538 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35577 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35567 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35516 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22220 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22220
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3gk7-f7rw-s3bt |
|
| 1 |
| url |
VCID-8ahg-hgub-43b5 |
| vulnerability_id |
VCID-8ahg-hgub-43b5 |
| summary |
A denial of service vulnerability in all versions of GitLab CE/EE before 13.12.2, 13.11.5 or 13.10.5 allows an attacker to cause uncontrolled resource consumption with a specially crafted issue or merge request |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22217 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71649 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71532 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71557 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.7153 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.7157 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71581 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71603 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71588 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71569 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71614 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71619 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71599 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22217 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22217
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8ahg-hgub-43b5 |
|
| 2 |
| url |
VCID-bakk-7gzs-sfd8 |
| vulnerability_id |
VCID-bakk-7gzs-sfd8 |
| summary |
A denial of service vulnerability in GitLab CE/EE affecting all versions since 11.8 allows an attacker to create a recursive pipeline relationship and exhaust resources. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22181 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.3811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38269 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38405 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38428 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38292 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38343 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38351 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38368 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38331 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38306 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38354 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38332 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38268 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22181 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22181
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bakk-7gzs-sfd8 |
|
| 3 |
| url |
VCID-k29f-m5ey-f3d6 |
| vulnerability_id |
VCID-k29f-m5ey-f3d6 |
| summary |
All versions of GitLab CE/EE starting from 12.8 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 were affected by an issue in the handling of x509 certificates that could be used to spoof author of signed commits. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22218 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31477 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31672 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31804 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31668 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31719 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31749 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31752 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31712 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31677 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31709 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31687 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31654 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22218 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22218
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k29f-m5ey-f3d6 |
|
| 4 |
| url |
VCID-kbpk-h81g-g7dr |
| vulnerability_id |
VCID-kbpk-h81g-g7dr |
| summary |
An information disclosure vulnerability in GitLab EE versions 13.11 and later allowed a project owner to leak information about the members' on-call rotations in other projects |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22215 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42312 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42371 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42442 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42471 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4241 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42461 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42468 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4249 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42453 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42423 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42472 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42447 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42376 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22215 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22215
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kbpk-h81g-g7dr |
|
| 5 |
| url |
VCID-n7d2-p93t-73fg |
| vulnerability_id |
VCID-n7d2-p93t-73fg |
| summary |
All versions of GitLab CE/EE starting from 9.5 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 allow a high privilege user to obtain sensitive information from log files because the sensitive information was not correctly registered for log masking. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22219 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43036 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43055 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43113 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43141 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.4308 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43133 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43145 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43166 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43118 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43179 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43168 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43102 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22219 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22219
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n7d2-p93t-73fg |
|
| 6 |
| url |
VCID-n83t-8xmt-q7cs |
| vulnerability_id |
VCID-n83t-8xmt-q7cs |
| summary |
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22214 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.92676 |
| scoring_system |
epss |
| scoring_elements |
0.99752 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.92676 |
| scoring_system |
epss |
| scoring_elements |
0.9975 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.93431 |
| scoring_system |
epss |
| scoring_elements |
0.99815 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.93431 |
| scoring_system |
epss |
| scoring_elements |
0.99817 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.93431 |
| scoring_system |
epss |
| scoring_elements |
0.99816 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.9357 |
| scoring_system |
epss |
| scoring_elements |
0.99833 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22214 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22214
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n83t-8xmt-q7cs |
|
| 7 |
| url |
VCID-s8ds-5b7r-gfed |
| vulnerability_id |
VCID-s8ds-5b7r-gfed |
| summary |
A cross-site leak vulnerability in the OAuth flow of all versions of GitLab CE/EE since 7.10 allowed an attacker to leak an OAuth access token by getting the victim to visit a malicious page with Safari |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22213 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76534 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76409 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.7644 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76422 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76454 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76468 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76494 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76472 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76508 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76512 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.765 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22213 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22213
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s8ds-5b7r-gfed |
|
| 8 |
| url |
VCID-t5qj-bzm5-5qhe |
| vulnerability_id |
VCID-t5qj-bzm5-5qhe |
| summary |
An issue has been discovered in GitLab affecting all versions starting from 12.9.0 before 13.10.5, all versions starting from 13.11.0 before 13.11.5, all versions starting from 13.12.0 before 13.12.2. Insufficient expired password validation in various operations allow user to maintain limited access after their password expired |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22221 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40578 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40679 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40763 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.4079 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40714 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40764 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40771 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40756 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40737 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40781 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40752 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40674 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22221 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22221
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t5qj-bzm5-5qhe |
|
| 9 |
| url |
VCID-y93u-mrdn-abe3 |
| vulnerability_id |
VCID-y93u-mrdn-abe3 |
| summary |
A denial of service vulnerability in all versions of GitLab CE/EE before 13.12.2, 13.11.5 or 13.10.5 allows an attacker to cause uncontrolled resource consumption with a very long issue or merge request description |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22216 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38122 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.3828 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38418 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38442 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38306 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38356 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38364 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38381 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38343 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38318 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38366 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38346 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38281 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22216 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22216
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y93u-mrdn-abe3 |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 10.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.11.3-1 |